This paper presents the design and construction of a comprehensive digital security system with the aim of providing a 24 hour digital watchdog for institutions such as banks, schools, the church, residential homes or anything that... more
This paper presents the design and construction of a comprehensive digital security system with the aim of providing a 24 hour digital watchdog for institutions such as banks, schools, the church, residential homes or anything that requires monitoring. The infra-red and digital technologies were used in the realization of this objective. The infra-red (I.R.) signal is transmitted by an I.R diode which is intercepted and decoded by the receiver circuitry. Obstructing the line of sight (within 8 meters) produced a digital display of the zone trespassed. This also triggers an alarm, both of which are designed to have duration of 30 seconds. The transmitters and sensors should be raised at least 1 meter above the ground to ensure that only humans trigger the alarm.
This paper presents the design and construction of a comprehensive digital security system with the aim of providing a 24 hour digital watchdog for institutions such as banks, schools, the church, residential homes or anything that... more
This paper presents the design and construction of a comprehensive digital security system with the aim of providing a 24 hour digital watchdog for institutions such as banks, schools, the church, residential homes or anything that requires monitoring. The infra-red and digital technologies were used in the realization of this objective. The infra-red (I.R.) signal is transmitted by an I.R diode which is intercepted and decoded by the receiver circuitry. Obstructing the line of sight (within 8 meters) produced a digital display of the zone trespassed. This also triggers an alarm, both of which are designed to have duration of 30 seconds. The transmitters and sensors should be raised at least 1 meter above the ground to ensure that only humans trigger the alarm.
Security is an important part for any communication structure. When protocol itself is prone to infectious and nodes are moving, then it is necessary to safeguard the communication channel to make secure communication. MANET’s ad-hoc... more
Security is an important part for any communication structure. When protocol itself is prone to infectious and nodes are moving, then it is necessary to safeguard the communication channel to make secure communication. MANET’s ad-hoc networks have no fixed infrastructure and freely moving node in the space. Security is a prominent challenge for ad-hoc network. In view of missing central authority, inadequate bandwidth, dynamic topology and open medium MANET's are exposed against different kinds of security attacks in network. Attackers attack MANET at various layers of its protocol stack. Since there is no competent routing protocol Network layer is most attacked. Also the watchdog mechanism provided is less effective and inefficient. The proposed will study influence on AODV protocol and watchdog mechanism of blackhole attack. Additionally we propose a method known as Neighbour Node Based Acknowledgement Intrusion Detection System (NNIDS) which works over principle of watchdog and pathrater. This method will find legitimate and secure way among source and destination utilizing neighbour node acknowledgement based technique, this component will handily recognize malignant nodes and shield the blackhole attack in MANET. The simulation has been carried out with variable Pause Time and node Speed and results show NNIDS is performing better every time in comparison to AODV with watchdog and intrusion
Political control is one of the central and conditioning aspects of the relationship between journalists and politicians. Through the perceptions of journalists and politicians, this article analyzes the validity, characteristics,... more
Political control is one of the central and
conditioning aspects of the relationship
between journalists and politicians.
Through the perceptions of journalists
and politicians, this article analyzes the
validity, characteristics, and functioning
of one of the principal mechanisms of political
control: the journalistic oversight of
politics, which is linked to the watchdog
theory and political pressures on the media.
In addition, the degree of mediatization
of politics is measured with regard
to media autonomy. The methodology is
based on in-depth interviews of 45 participants
in Spain. The results indicate
the pre-eminence of political pressures
that are principally exercised via indirect
means (i.e., communications offices
and media enterprises). The latter are a
vehicle for channeling political control,
which reveals the weight of the factors
associated with political economy in the
relationship between journalists and
politicians. Finally, the low incidence of
journalistic oversight of politics reveals a
reduced level of mediatization in Spain.
We propose in this paper a connectivity - aware routing algorithm and a set of related theorems. This algorithm allows nodes in Mobile Adhoc and Sensor Networks (MASNets) to provide the highest connectivity life time to a specific... more
We propose in this paper a connectivity - aware routing algorithm and a set of related theorems. This algorithm allows nodes in Mobile Adhoc and Sensor Networks (MASNets) to provide the highest connectivity life time to a specific destination since the issuance of data becomes a necessity for MAS Nets. In the proposed Solution, nodes in MASNets are able to specify the disjointness degree of the available paths allowing the discovery of the optimal set of backup routes and consequently enhance the survivability of the connectivity. These nodes perfo rm an on - demand discovery and a generation of a set of routes, by specifying a disjointness threshold, representing the maximal number of nodes shared between any two paths in the set of k established paths. The proposed multipath routing algorithm, is ada ptive, secure, and uses labels to carry the disjointness - threshold between nodes during the route discovery. A set of security mechanisms, based on the Watchdog and the digital signature concepts, is used to protect t he route discovery process .
It is believed that the press performs a public role as a watchdog in monitoringthe abuse of political power and the corruption of a society. However, as thepress itself emerges as a huge power, it is said that there must be an... more
It is believed that the press performs a public role as a watchdog in monitoringthe abuse of political power and the corruption of a society. However, as thepress itself emerges as a huge power, it is said that there must be an apparatusto watch the press. One of desirable ways to keep an eye on the press has beenrealized the ‘media critic’. Problem is that the media critic often brings libel suits. This study examined how Korean courts understand about media critic, statusof the media, and freedom of the press in libel suits raised by media critics. Itwas found out that media critic is mostly decided as defamatory based on thecontext of the writings and perception of the readers. In the cases where theplaintiffs failed to win, the courts thought of the press as public figure and saidthat mutual critics between media should be encouraged. However, when theplaintiffs won, not many, the courts found that extremely malicious andaggressive expressions cannot be exempt from the responsibility of defamation.